Home |
Search |
Today's Posts |
#11
![]() |
|||
|
|||
![]() "R. Steve Walz" wrote in message ... L'acrobat wrote: "phil hunt" wrote in message . .. transmissions still very clear), and the use of FH combined with crypto key makes it darned near impossible for the bad guy to decypher it in any realistic timely manner. Modern crypto is good enough to withstand all cryptanalytic attacks. Thank you Admiral Doenitz... ------------ He's right. Major breaththrough of all possible barriers, the RSA algorithm. Uncrackable in the lifetime of the serious user, and crack is entirely predictable with improved computing power and can be lengthened to compensate. The fact that you and I think it is unbeatable, doesn't mean it is. "lifetime of the serious user" what ********, you and I have absolutely no idea what sort of tech/processing power will be available 10 years from now, let alone 30. "and crack is entirely predictable with improved computing power" of course it is... Ask the good Admiral how confident he was that his system was secure. Damn near as confident as you are and that worked out so well, didn't it? |
#12
![]() |
|||
|
|||
![]() "R. Steve Walz" wrote in message ... L'acrobat wrote: "phil hunt" wrote in message . .. transmissions still very clear), and the use of FH combined with crypto key makes it darned near impossible for the bad guy to decypher it in any realistic timely manner. Modern crypto is good enough to withstand all cryptanalytic attacks. Thank you Admiral Doenitz... ------------ He's right. Major breaththrough of all possible barriers, the RSA algorithm. Uncrackable in the lifetime of the serious user, and crack is entirely predictable with improved computing power and can be lengthened to compensate. The fact that you and I think it is unbeatable, doesn't mean it is. "lifetime of the serious user" what ********, you and I have absolutely no idea what sort of tech/processing power will be available 10 years from now, let alone 30. "and crack is entirely predictable with improved computing power" of course it is... Ask the good Admiral how confident he was that his system was secure. Damn near as confident as you are and that worked out so well, didn't it? |
#13
![]() |
|||
|
|||
![]()
On Thu, 25 Sep 2003 14:47:07 +1000, L'acrobat wrote:
"lifetime of the serious user" what ********, you and I have absolutely no idea what sort of tech/processing power will be available 10 years from now, Ever heard of Moore's law? I've got a pretty good idea. A typical PC now has a 2 GHz CPU, and about 256 MB RAM. Assume these double every 18 months. 10 years is about 7 doublings so in 2003 we'll see PCs with 250 GHz CPUs and 32 GB of RAM. -- "It's easier to find people online who openly support the KKK than people who openly support the RIAA" -- comment on Wikipedia |
#14
![]() |
|||
|
|||
![]()
On Thu, 25 Sep 2003 14:47:07 +1000, L'acrobat wrote:
"lifetime of the serious user" what ********, you and I have absolutely no idea what sort of tech/processing power will be available 10 years from now, Ever heard of Moore's law? I've got a pretty good idea. A typical PC now has a 2 GHz CPU, and about 256 MB RAM. Assume these double every 18 months. 10 years is about 7 doublings so in 2003 we'll see PCs with 250 GHz CPUs and 32 GB of RAM. -- "It's easier to find people online who openly support the KKK than people who openly support the RIAA" -- comment on Wikipedia |
#16
![]() |
|||
|
|||
![]() |
#17
![]() |
|||
|
|||
![]()
In (rec.radio.amateur.homebrew), phil hunt wrote:
Modern crypto is good enough to withstand all cryptanalytic attacks. That's a great idea, and I suspect tthat you're right in the general case. But a modern cryptosystem, badly implemented, will have all manner of vulnerabilities -- most of which are not particularly obvious. Remember the competition for the successor to DES as the standard crypto algorithm? That was *quite* interesting. -- "Remember: every member of your 'target audience' also owns a broadcasting station. These 'targets' can shoot back." -- Michael Rathbun to advertisers, in nanae |
#18
![]() |
|||
|
|||
![]()
In (rec.radio.amateur.homebrew), phil hunt wrote:
Modern crypto is good enough to withstand all cryptanalytic attacks. That's a great idea, and I suspect tthat you're right in the general case. But a modern cryptosystem, badly implemented, will have all manner of vulnerabilities -- most of which are not particularly obvious. Remember the competition for the successor to DES as the standard crypto algorithm? That was *quite* interesting. -- "Remember: every member of your 'target audience' also owns a broadcasting station. These 'targets' can shoot back." -- Michael Rathbun to advertisers, in nanae |
#19
![]() |
|||
|
|||
![]() |
#20
![]() |
|||
|
|||
![]() |
Reply |
Thread Tools | Search this Thread |
Display Modes | |
|
|
![]() |
||||
Thread | Forum | |||
Amateur Radio Newsline™ Report 1419  October 22, 2004 | Dx | |||
F6FBB to Internet email? | Digital | |||
F6FBB to Internet email? | Digital | |||
Internet trials and the European EMC directive | Equipment | |||
Internet trials and the European EMC directive | Equipment |